Unshackle the Cloud: Commoditization of the Cloud

Preview:

DESCRIPTION

Unshackle the Cloud: Commoditization of the Cloud. Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5412, Guest Lecture, Cornell University January 24, 2012. Context. The promise of the Cloud A computer utility; a commodity Catalyst for technology economy - PowerPoint PPT Presentation

Citation preview

Unshackle the Cloud: Commoditization of the Cloud

Hakim WeatherspoonAssistant Professor, Dept of Computer Science

CS 5412, Guest Lecture, Cornell UniversityJanuary 24, 2012

• The promise of the Cloud– A computer utility; a commodity– Catalyst for technology economy– Revolutionizing for health care, financial systems, scientific research, and society

Context

• The promise of the Cloud– ubiquitous, convenient, on-demand network access to a

shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Context

NIST Cloud Definition

• The promise of the Cloud– ubiquitous, convenient, on-demand network access to a

shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Context

NIST Cloud Definition

• The promise of the Cloud– ubiquitous, convenient, on-demand network access to a

shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

• However, cloud platforms entail significant risk– Vendor Lock-in– Storage Lock-in– Computation Lock-in

Context

• How to use the cloud?– Storage– Computation– Network

• Without being locked into a single cloud provider?

Challenge

• Breaking Cloud Storage Lock-in• Breaking Cloud Computation Lock-in– (Nested) Virtualization

Outline

Vendor Lock-in: Cloud Storage• Large organizations considering using the cloud – New York Times– Netflix– Nintendo– Cornell– Library of Congress

• The more data you have, the harder it is to move– Switching providers entails paying for bandwidth twice– Inhibits opportunistic migration

Vendor Lock-in: Cloud Storage• How hard is it to move a PetaByte?

Titan tech boom, randy katz, 2008

Vendor Lock-in: Cloud Storage• All my valuable data/computation is in the cloud Am I locked in to one provider forever?– The more data you have, the harder it is to move

• RACS: Redundant Array of Cloud Storage– Collaboration with the Internet Archive and IBM

RACS(3,4)

n=4k=3

• All my valuable data/computation is in the cloud Am I locked in to one provider forever?– The more data you have, the harder it is to move

• RACS: Redundant Array of Cloud Storage– Collaboration with the Internet Archive and IBM33KB33KB33KB

33KBObject100 KB

Vendor Lock-in: Cloud Storage

RACS(3,4)

n=4k=3

RACS(3,4)

Object100 KB

Relative Storage n/k

Relative Upload Bandwidth n/k

Relative Download Bandwidth 1

Vendor Lock-in: Cloud Storage

Object100 KB

RACS(3,4)

Relative Storage n/k

Relative Upload Bandwidth n/k

Relative Download Bandwidth 1

33KB

33KB

33KB

33KB

Estimated Cost of Switching Cloud Providers

• Graduate Students– Hussam Abu-Libdeh– Lonnie Princehouse– Ji Yong Shin

• Collaborators– Sandra Payette (Fedora Commons)

• Website:– http://racs.cs.cornell.edu

Vendor Lock-in: Cloud Storage

Vendor Lock-in: Cloud Computation• Cloud storage is only a half third of the story– What about computation?

• How can I move my computation between clouds?

Vendor Lock-in: Cloud Computation• Move computation via Virtualization– Virtualize processor Instruction Set Architecture– Full Virtualization vs Paravirtualization (of hardware)– VMWare vs (Original) Xen

• Xen– Separation of policy and mechanism– DomU hosts guest operating system in virtual machine– Dom0 manages devices and guests– Control Transfer: Hypercalls and Events (like syscalls and device interrupts)

Xen

Linux Dom0 Linux DomU: VMShared MemoryDevice: Ring

FrontendBackend

PCI-Driver

Baremetal

Vendor Lock-in: Cloud Computation

• Can I compute in the cloud if some of my data is in a vault at

home or on another provider

Object100 KB

33KB

33KB

33KB

33KB

VMM

Guest OS

App

VMM

VMM

VMM

VMM

Guest OS

App

Guest OS

App

Vendor Lock-in: Cloud Computation

Vendor Lock-in: Cloud Computation

VMM

Guest OS

App

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

1910/11/2010

Vendor Lock-in: Cloud Computation

VMM

Guest OS

App

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

2010/11/2010

Unshackle the Cloud: xClouds

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

2110/11/2010

How to Build xClouds

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

2210/11/2010

How to Build xClouds

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

2310/11/2010

How to Build xClouds

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

2410/11/2010

How to Build xClouds: Alternatives

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

2510/11/2010

How to Build xClouds: Alternatives

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

2610/11/2010

How to Build xClouds: Alternatives

Xen

Linux Dom0 Linux DomU: VMShared MemoryDevice: Ring

FrontendBackend

PCI-Driver

Baremetal

How to Build xClouds: Another Layer

How to Build xClouds: Another Layer

1st-Layer Xen

Baremetal

Linux Dom0

Xen - 4.1.1 Blanket

Dom0 forXenblanket

PV-DomU

PV-DomU

FrontendBackend

FrontendBackend

PCI-Driver

Device

Frontend

Hypercalls

Hypercall Passthrough• Need Hypercall Passthrough– Nested Dom0 must be able to get information about

shared memory devices from 1st Layer-Xen

– Nested Dom0 can only issue hypercall to Nested Xen• So, nested Xen should help passthrough related hypercalls

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

3210/11/2010

Will xClouds Perform?

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

3310/11/2010

Configuration for Comparison

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

3410/11/2010

Nested Microbenchmark

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

3510/11/2010

Disk Write Throughput

IBM Visit, Critical Infrastructure, by Hakim Weatherspoon

3610/11/2010

Network Receive Throughput

• Nested paravirtual device drivers• Xen on EC2

xClouds works Today!

VMM

VMM

VMM

VMM

VMM

Object100 KB

33KB

33KB

33KB

33KB

VMM

Guest OS

App

VMM

VMM

VMM

VMM

Guest OS

App

Guest OS

App

• Nested paravirtual device drivers• Xen on EC2

• Can create your own Cloud-within-a-Cloud

xClouds works Today!

• Graduate Students– Dan Williams– Zhefu Jiang– Ji Yong Shin

• External Collaborators– Hani Jamjoom (IBM)

xClouds works Today!

• “With great power comes great responsibility”– Cloud technology can be used to address economic

concerns

• Treating the cloud as a commodity– Users need to be able to trade-off overhead and vendor

mobility– Providers need to be accountable to users and environment

• Lots more research to do to achieve the promise of the Cloud

Summary

• Paper Trail Theme: Cloud & Vendor Lock-in– xCloud/Xen-Blanket in EuroSys-2012– xCloud in HotCloud-2011– Overdriver in VEE-2011– RACS in SOCC-2010

• More at http://fireless.cs.cornell.edu and also http://xcloud.cs.cornell.edu

• Email: hweather@cs.cornell.edu

– Ralph Waldo Emerson

“Nature is a mutable cloud which isalways and never the same”

Backup

Recommended